GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
A Hybrid Cloud Approach for Secure 
Authorized Deduplication 
ABSTRACT 
Data deduplication is one of important data compression techniques for 
eliminating duplicate copies of repeating data, and has been widely used in cloud 
storage to reduce the amount of storage space and save bandwidth. To protect the 
confidentiality of sensitive data while supporting deduplication, the convergent 
encryption technique has been proposed to encrypt the data before outsourcing. To 
better protect data security, this paper makes the first attempt to formally address 
the problem of authorized data deduplication. Different from traditional 
deduplication systems, the differential privileges of users are further considered in 
duplicate check besides the data itself.We also present several new deduplication 
constructions supporting authorized duplicate check in a hybrid cloud architecture. 
Security analysis demonstrates that our scheme is secure in terms of the definitions 
specified in the proposed security model. As a proof of concept, we implement a 
prototype of our proposed authorized duplicate check scheme and conduct testbed 
experiments using our prototype. We show that our proposed authorized duplicate 
check scheme incurs minimal overhead compared to normal operations.
Existing System 
Data deduplication is one of important data compression techniques 
for eliminating duplicate copies of repeating data, and has been widely used in 
cloud storage to reduce the amount of storage space and save bandwidth. To 
protect the confidentiality of sensitive data while supporting deduplication, Cloud 
computing provides seemingly unlimited “virtualized” resources to users as 
services across the whole Internet, while hiding platform and implementation 
details. Today’s cloud service providers offer both highly available storage and 
massively parallel computing resources at relatively low costs. As cloud computing 
becomes prevalent, an increasing amount of data is being stored in the cloud and 
shared by users with specified privileges, which define the access rights of the 
stored data. 
Problems on existing system: 
1.One critical challenge of cloud storage services is the management of the 
ever-increasing volume of data. 
Proposed System 
The convergent encryption technique has been proposed to encrypt the 
data before outsourcing. To better protect data security, this paper makes the 
first attempt to formally address the problem of authorized data deduplication. 
Different from traditional deduplication systems, the differential privileges of 
users are further considered in duplicate check besides the data itself.We also 
present several new deduplication constructions supporting authorized duplicate 
check in a hybrid
cloud architecture. Security analysis demonstrates that our scheme is secure in 
terms of the definitions specified in the proposed security model. As a proof of 
concept, we implement a prototype of our proposed authorized duplicate check 
scheme and conduct testbed experiments using our prototype. We show that our 
proposed authorized duplicate check scheme incurs minimal overhead compared 
to normal operations. 
Advantages: 
1.One critical challenge of cloud storage services is the management of the 
ever-increasing volume of data. 
Implementation 
Implementation is the stage of the project when the theoretical design is 
turned out into a working system. Thus it can be considered to be the most 
critical stage in achieving a successful new system and in giving the user, 
confidence that the new system will work and be effective. 
The implementation stage involves careful planning, investigation of the 
existing system and it’s constraints on implementation, designing of methods to 
achieve changeover and evaluation of changeover methods. 
Main Modules:-
1. User Module: 
In this module, Users are having authentication and security to access the 
detail which is presented in the ontology system. Before accessing or searching the 
details user should have the account in that otherwise they should register first. 
2. Secure DeDuplication System: 
To support authorized deduplication, the tag of a file F will be determined by 
the file F and the privilege. To show the difference with traditional notation of 
tag, we call it file token instead. To support authorized access, a secret key kp will 
be bounded with a privilege p to generate a file token. Let ϕ′ F;p = TagGen(F, kp) 
denote the token of F that is only allowed to access by user with privilege p. In 
another word, the token ϕ′ F;p could only be computed by the users with privilege 
p. As a result, if a file has been uploaded by a user with a duplicate token ϕ′ 
F;p, then a duplicate check sent from another user will be successful if and only if 
he also has the file F and privilege p. Such a token generation function could be 
easily implemented as H(F, kp), where H(_) denotes a cryptographic hash function. 
3. Security Of Duplicate Check Token : 
We consider several types of privacy we need protect, that is, i) 
unforgeability of duplicate-check token: There are two types of adversaries, that is, 
external adversary and internal adversary. As shown below, the external adversary 
can be viewed as an internal adversary without any privilege. If a user has privilege 
p, it requires that the adversary cannot forge and output a valid duplicate token 
with any other privilege p′ on any file F, where p does not match p′. Furthermore, 
it also requires that if the adversary does not make a request of token with its own 
privilege from private cloud server, it cannot forge and output a valid duplicate 
token with p on any F that has been queried.
4. Send Key: 
Once the key request was received, the sender can send the key or he can 
decline it. With this key and request id which was generated at the time of 
sending key request the receiver can decrypt the message. 
Configuration:- 
H/W System Configuration:- 
Processor - Pentium –III 
Speed - 1.1 Ghz 
RAM - 256 MB(min) 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 5.0 
 Database Connectivity : JDBC.

2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure authorized deduplication

  • 1.
    GLOBALSOFT TECHNOLOGIES IEEEPROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com A Hybrid Cloud Approach for Secure Authorized Deduplication ABSTRACT Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself.We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
  • 2.
    Existing System Datadeduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, Cloud computing provides seemingly unlimited “virtualized” resources to users as services across the whole Internet, while hiding platform and implementation details. Today’s cloud service providers offer both highly available storage and massively parallel computing resources at relatively low costs. As cloud computing becomes prevalent, an increasing amount of data is being stored in the cloud and shared by users with specified privileges, which define the access rights of the stored data. Problems on existing system: 1.One critical challenge of cloud storage services is the management of the ever-increasing volume of data. Proposed System The convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself.We also present several new deduplication constructions supporting authorized duplicate check in a hybrid
  • 3.
    cloud architecture. Securityanalysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations. Advantages: 1.One critical challenge of cloud storage services is the management of the ever-increasing volume of data. Implementation Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:-
  • 4.
    1. User Module: In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first. 2. Secure DeDuplication System: To support authorized deduplication, the tag of a file F will be determined by the file F and the privilege. To show the difference with traditional notation of tag, we call it file token instead. To support authorized access, a secret key kp will be bounded with a privilege p to generate a file token. Let ϕ′ F;p = TagGen(F, kp) denote the token of F that is only allowed to access by user with privilege p. In another word, the token ϕ′ F;p could only be computed by the users with privilege p. As a result, if a file has been uploaded by a user with a duplicate token ϕ′ F;p, then a duplicate check sent from another user will be successful if and only if he also has the file F and privilege p. Such a token generation function could be easily implemented as H(F, kp), where H(_) denotes a cryptographic hash function. 3. Security Of Duplicate Check Token : We consider several types of privacy we need protect, that is, i) unforgeability of duplicate-check token: There are two types of adversaries, that is, external adversary and internal adversary. As shown below, the external adversary can be viewed as an internal adversary without any privilege. If a user has privilege p, it requires that the adversary cannot forge and output a valid duplicate token with any other privilege p′ on any file F, where p does not match p′. Furthermore, it also requires that if the adversary does not make a request of token with its own privilege from private cloud server, it cannot forge and output a valid duplicate token with p on any F that has been queried.
  • 5.
    4. Send Key: Once the key request was received, the sender can send the key or he can decline it. With this key and request id which was generated at the time of sending key request the receiver can decrypt the message. Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp
  • 6.
     Scripts :JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC.